Zero permission android applications - attacks and defenses
Moonsamy, Veelasha and Batten, Lynn 2012, Zero permission android applications - attacks and defenses, in ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, School of Information Systems, Deakin University, Melbourne, Vic., pp. 5-9.
(Some files may be inaccessible until you login with your DRO credentials)
Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact email@example.com.